SuSE 10 Security Update : apache2 (ZYPP Patch Number 4669)

medium Nessus Plugin ID 29373

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

Several bugs were fixed in the Apache2 webserver :

These include the following security issues :

- mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset 'detection'.
(CVE-2006-5752)

- mod_cache: Prevent a segmentation fault if attributes are listed in a Cache-Control header without any value.
(CVE-2007-1863)

- prefork, worker, event MPMs: Ensure that the parent process cannot be forced to kill processes outside its process group. (CVE-2007-3304)

- mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. (CVE-2007-3847)

- mod_autoindex: Add in ContentType and Charset options to IndexOptions directive. This allows the admin to explicitly set the content-type and charset of the generated page. (CVE-2007-4465)

and the following non-security issues :

- get_module_list: replace loadmodule.conf atomically

- Use File::Temp to create good tmpdir in logresolve.pl2 (httpd-2.x.x-logresolve.patchs)

Solution

Apply ZYPP patch number 4669.

See Also

http://support.novell.com/security/cve/CVE-2006-5752.html

http://support.novell.com/security/cve/CVE-2007-1863.html

http://support.novell.com/security/cve/CVE-2007-3304.html

http://support.novell.com/security/cve/CVE-2007-3847.html

http://support.novell.com/security/cve/CVE-2007-4465.html

Plugin Details

Severity: Medium

ID: 29373

File Name: suse_apache2-4669.nasl

Version: 1.16

Type: local

Agent: unix

Published: 12/13/2007

Updated: 1/14/2021

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 11/9/2007

Reference Information

CVE: CVE-2006-5752, CVE-2007-1863, CVE-2007-3304, CVE-2007-3847, CVE-2007-4465

CWE: 79